General
-
Target
1b5067cc0611da1ce71f903853130e08.exe
-
Size
152KB
-
Sample
230716-jgyqwsda96
-
MD5
1b5067cc0611da1ce71f903853130e08
-
SHA1
93eb2526fac22859666b38ebc83dda94799edbd4
-
SHA256
7190acb0296e76093f033d2656820befaa0bb790336c27f846c4a3bd8a6882e6
-
SHA512
50f08d31e7c6eebc5fb17a6c68460cd12637ce90b9f57cbd8bd65919c905dda48405f8f76c013ecbc5a6e152f65c8ebfa39a8f031fb902ecdb150d490bccf616
-
SSDEEP
3072:3BjbK/Pcwyly02G8H2NRlRXb7zWewBVjVHgbY:V0E67bubvAVAb
Behavioral task
behavioral1
Sample
1b5067cc0611da1ce71f903853130e08.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
1b5067cc0611da1ce71f903853130e08.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.keresa.com.my - Port:
587 - Username:
[email protected] - Password:
Keresa123+- - Email To:
[email protected]
Targets
-
-
Target
1b5067cc0611da1ce71f903853130e08.exe
-
Size
152KB
-
MD5
1b5067cc0611da1ce71f903853130e08
-
SHA1
93eb2526fac22859666b38ebc83dda94799edbd4
-
SHA256
7190acb0296e76093f033d2656820befaa0bb790336c27f846c4a3bd8a6882e6
-
SHA512
50f08d31e7c6eebc5fb17a6c68460cd12637ce90b9f57cbd8bd65919c905dda48405f8f76c013ecbc5a6e152f65c8ebfa39a8f031fb902ecdb150d490bccf616
-
SSDEEP
3072:3BjbK/Pcwyly02G8H2NRlRXb7zWewBVjVHgbY:V0E67bubvAVAb
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-